-
3
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
Goh, E., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proc. of NDSS (2003).
-
(2003)
Proc. of NDSS
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
4
-
-
4544290272
-
Swaminathan: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan.: Scalable secure file sharing on untrusted storage. In: Proc. of FAST (2003).
-
(2003)
Proc. of FAST
-
-
Kallahalla, M.1
Riedel, E.2
-
5
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB (2007).
-
(2007)
Proc. of VLDB
-
-
De Capitani, D.V.S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
34547325357
-
Secure atrribute-based systems
-
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Atrribute-Based Systems. In: Proc. of ACM CCS (2006).
-
(2006)
Proc. of ACM CCS
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
9
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of IEEE INFOCOM (2010).
-
(2010)
Proc. of IEEE INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
10
-
-
34547273527
-
Attribute based encryption for fine-grained access conrol of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine-Grained Access Conrol of Encrypted Data. In: Proc. of ACM CCS (2006).
-
(2006)
Proc. of ACM CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute Based Data Sharing with Attribute Revocation. In: Proc. of ACM ASIACCS (2010).
-
(2010)
Proc. of ACM ASIACCS
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
13
-
-
0018545449
-
How to share a secret [J]
-
SHAMIR A.How to share a secret [J].Communications of the ACM, 1979, 24(11):612-613.
-
(1979)
Communications of the ACM
, vol.24
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
78649998200
-
Hierachical attibute-based encryption for fine-grained access control in cloud storage services
-
Wang, G., Liu, Q., Wu, J.: Hierachical attibute-based encryption for fine-grained access control in cloud storage services. In: Proc. of ACM CCS (2010)
-
(2010)
Proc. of ACM
, vol.CCS
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
17
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
Liang, X., Cao, Z., Lin, H.: Attribute based proxy re-encryption with delegating capabilities. In: Proc. of ACM ASIACCS (2009).
-
(2009)
Proc. of ACM ASIACCS
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
-
18
-
-
84855342560
-
On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption
-
Liu, Z., Cao, Z.: On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption. IACR Cryptology ePrint Archive 2010: 374 (2010).
-
(2010)
IACR Cryptology EPrint Archive
, vol.2010
, pp. 374
-
-
Liu, Z.1
Cao, Z.2
-
20
-
-
84874261579
-
Fine-grained data access control systems with user accountability in cloud computing
-
Li, J., Zhao, G., Chen, X.: Fine-grained Data Access Control Systems with User Accountability in Cloud Computing. In: Proc. of CloudCom (2010).
-
(2010)
Proc. of CloudCom
-
-
Li, J.1
Zhao, G.2
Chen, X.3
-
21
-
-
84874244902
-
A secure and efficient role-based access policy towards cryptographic cloud storage
-
Hong, C., Lv, Z., Zhang, M.: A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage. In: Proc. of WAIM (2011).
-
(2011)
Proc. of WAIM
-
-
Hong, C.1
Lv, Z.2
Zhang, M.3
|